TY - CHAP
T1 - Efficient resource management in Green computing based on ISHOA task scheduling with secure ChaCha20-Poly1305 authenticated encryption-based data transmission
AU - Kumar, B. Santosh
AU - Kumar, K. A.Jayasheel
AU - Kavin, Balasubramanian Prabhu
AU - Seng, Gan Hong
N1 - Publisher Copyright:
© 2024, IGI Global.
PY - 2024/2/27
Y1 - 2024/2/27
N2 - One of the hottest new technologies that allows users to handle a broad range of resources and massive amounts of data in the cloud is green computing resource management. One of the biggest obstacles is task scheduling, and poor management leads to a decrease in productivity. The task must be efficiently scheduled to ensure optimal resource utilisation and minimal execution time. Given this, this study suggests a fresh method for efficient task scheduling in a green computing environment that also offers improved security. There is a development of an enhanced spotted hyena optimizer (ISHO). Finding the ideal or almost ideal subset with a straightforward structure to minimise the specified fitness function is a strong point of the SHO. It enhances a switch strategy in the spotted hyena's position updating mechanism and generates random positions in place of the violated spotted hyenas in order to support the proposed ISHO's exploration characteristics. Second, the data is encrypted using the ChaCha20-Poly1305 authenticated encryption algorithm, ensuring secure data transmission.
AB - One of the hottest new technologies that allows users to handle a broad range of resources and massive amounts of data in the cloud is green computing resource management. One of the biggest obstacles is task scheduling, and poor management leads to a decrease in productivity. The task must be efficiently scheduled to ensure optimal resource utilisation and minimal execution time. Given this, this study suggests a fresh method for efficient task scheduling in a green computing environment that also offers improved security. There is a development of an enhanced spotted hyena optimizer (ISHO). Finding the ideal or almost ideal subset with a straightforward structure to minimise the specified fitness function is a strong point of the SHO. It enhances a switch strategy in the spotted hyena's position updating mechanism and generates random positions in place of the violated spotted hyenas in order to support the proposed ISHO's exploration characteristics. Second, the data is encrypted using the ChaCha20-Poly1305 authenticated encryption algorithm, ensuring secure data transmission.
UR - http://www.scopus.com/inward/record.url?scp=85189585125&partnerID=8YFLogxK
U2 - 10.4018/979-8-3693-1552-1.ch014
DO - 10.4018/979-8-3693-1552-1.ch014
M3 - Chapter
AN - SCOPUS:85189585125
SN - 9798369315521
SP - 267
EP - 286
BT - Computational Intelligence for Green Cloud Computing and Digital Waste Management
PB - IGI Global
ER -